For information security professionals, the trip from a proprietary data center to a combination of cloud computing, Software as a Service (SaaS), colocation (colo) facilities and managed services is not half the fun. Read More

In previous columns, I advocated the use of an ISACA paper on creating audit programs. This article will once again apply this process to build an audit program for privacy for your organization. Read More

The ISACA Journal has a proud tradition of serving our community for more than 40 years, evolving to meet the needs and interests of practitioners amid the ever-changing technology landscape. Read More

When it comes to assessing risk factors and gaps in an information security structure, it is important to identify what type of information is stored, how it is transmitted and accessed, and what risk factors pose possible threats... Read More

The exposure of data for up to 14 million of Verizon’s customers in July 2017 was an enormous embarrassment, particularly for an organization that presents itself as a premium cybersecurity consultancy. Read More

A SOC is a set of staff, processes, technologies and facilities that is primarily focused on identification (detection) and response to cybersecurity incidents that arise as a result of cybersecurity threat realizations. Read More

The world of information and data management is changing faster than anyone could have predicted a few years ago, and attention to sensitive data protection is growing, as the new GDPR is clearly proving. Read More

As organizations try to keep up with rapid changes in technology, they are using acquisitions as a way to quickly develop entirely new lines of business or to simply close gaps in technological capability. Read More

Understanding the key factors that influence effective BIS is crucial for business leaders; otherwise, security problems can occur, which can lead to financial loss, unavailability, reputational damage or even bankruptcy. Read More

My organization has initiated a project to use blockchain technology. We have been hearing about this technology becoming the backbone of digital currency, but we have also heard that there are many issues related to digital currency. Read More